You are on page 1of 14

Ajeenkya DY Patil School of Engineering

(Polytechnic)

(Charholi) Via Lohegaon, Pune-412 105

Department of Computer Engineering


2023-24[
Micro-project Report of
Network and Information Security
On
Write a program to implement the DES algorithm

Submitted by:
Name of Student :- Nagesh Jaybhaye

Under the Guidance of


Ms. Sandhya Chavan
AJEENKYA DY PATIL SCHOOL OF ENGINEERING
POLYTECHNIC (CHARHOLI)
Department of Computer Engineering

SEMESTER-6

2023-24

CERTIFICATE
This is to certify that Mr. Nagesh Jaybhaye has submitted Project report entitled "Write a
program to implement the DES algorithm" is submitted in the partial fulfillment of
requirement for the award of the Diploma in Computer Engineering by Maharashtra
State Board of Technical Education as record of students' own work carried out by
them under the guidance and supervision at Ajeenkya DY Patil School Of Engineering
(Charholi), during the academic year 2023-24.

Place: Charholi (Bk)


Date: / /2024.

(Ms. Sandhya Chavan) (Mr. Sandip Pandey)


Guide Head of Computer Department
ACKNOWLEDGEMEMT

It is with profoundly sense of gratitude that we acknowledge from our guide


Ms. Sandhya Chavan. She has been guide in the true sense of word, a guide who
satisfaction from our word & progress.

We are highly obliged to Mr. Sandip Pandey Head of Computer


Department for aberrance & good co-operation given to us for bringing this
project to almost standard.
We are grateful to our principal Dr. Nagesh Shelke for proceeding
acknowledgement to us in the connection of this project concluding. We
appreciate the assistance of all staff that helps us in for their sincere & obliging
help to make our project successfully.
Index

Sr.no Topic Pg.no

1. Brief Introduction 5

2. Aim of the project 5

3. Action Plan 6

4. Resources Required 7

5. Co Integrated 7

6. Figure Table 7

7. DES Algorithm 8

8. Source Code 11

9. Skilled development, Reference, Conclusion 12


Micro Project Proposal
Part A
Write a program to implement the DES
algorithm

1. Brief Introduction:

The Data Encryption Standard (DES) was a widely used symmetric-key algorithm for
encrypting digital data. It was developed in the 1970s and adopted as a federal standard in the
United States. DES played a significant role in the development of modern cryptography, but its
short key length (56 bits) makes it insecure for contemporary applications.

Here are some key points about DES:

 Type of algorithm: Symmetric-key block cipher


 Block size: 64 bits
 Key size: 56 bits (effective)
 Structure: Feistel network with 16 rounds
 Security: No longer considered secure due to short key length

While no longer recommended for encryption, DES remains a foundational concept in


cryptography and is still used in some legacy systems.

2. Aim Of The Micro Project:

 Program to implement the DES algorithm.


 To understand the concept for DES algorithm
 To understand the concept of encryption and Decryption
 To understand the concept of cryptography
3. Action Plan:

Sr.no Details of activity


Planned start Planned end Name of responsible
date date group members
1. Searching for the topic

2. Confirmed the topic


we searched for for the
micro project

3. Collecting information

4. Making proposal
Nagesh Jaybhaye

5. Testing and analysis


of test result

6. Preparation of
final project
report

7. Final submission of the


project
4. Resources Required:

Sr. No. Name of Specification


resources/Material
1. Computer System Intel Core i5

2. OS Windows 12

3. Text Editor Visual Studio

4. Textbook Network & Information


Security

5. Name Of Team Members:

Name Roll No.


Nagesh Jaybhaye 51

6. Course Outcomes Integrated:

 How to implement the DES algorithm


 Concept of Encryption and decryption.
 Concept of Cryptography.

7. Figure Table

Sr. No Figure Name Pg. No


1. Decoding every 8th bit of original key 8
2. Board level step of DES 9
3. Initial permutation table 9
4. Initial permutation Chart 10
5. No. of keys Shifted per round 10
6. Compression permutation 11
7. Division of 32 bit RPT into 8 bit block 11
8. Inputs of Microproject:

DES Algorithm
Data Encryption Standard (DES) is a block cipher with a 56-bit key length that has played a
significant role in data security. Data encryption standard (DES) has been found vulnerable to very powerful
attacks therefore, the popularity of DES has been found slightly on the decline. DES is a block cipher and
encrypts data in blocks of size of 64 bits each, which means 64 bits of plain text go as the input to DES,
which produces 64 bits of ciphertext. The same algorithm and key are used for encryption and decryption,
with minor differences. The key length is 56 bits.

The basic idea is shown below:


We have mentioned that DES uses a 56-bit key. Actually, The initial key consists of 64 bits. However,
before the DES process even starts, every 8 th bit of the key is discarded to produce a 56-bit key. That is bit
positions 8, 16, 24, 32, 40, 48, 56, and 64 are discarded.

Thus, the discarding of every 8 th bit of the key produces a 56-bit key from the original 64-bit key.
DES is based on the two fundamental attributes of cryptography: substitution (also called confusion) and
transposition (also called diffusion). DES consists of 16 steps, each of which is called a round. Each round
performs the steps of substitution and transposition. Let us now discuss the broad-level steps in DES.
 In the first step, the 64-bit plain text block is handed over to an initial Permutation (IP) function.
 The initial permutation is performed on plain text.
 Next, the initial permutation (IP) produces two halves of the permuted block; saying Left Plain
Text (LPT) and Right Plain Text (RPT).
 Now each LPT and RPT go through 16 rounds of the encryption process.
 In the end, LPT and RPT are rejoined and a Final Permutation (FP) is performed on the
combined block
 The result of this process produces 64-bit ciphertext.
Initial Permutation (IP)

As we have noted, the initial permutation (IP) happens only once and it happens before the first round. It
suggests how the transposition in IP should proceed, as shown in the figure. For example, it says that the IP
replaces the first bit of the original plain text block with the 58 th bit of the original plain text, the second bit
with the 50th bit of the original plain text block, and so on.
This is nothing but jugglery of bit positions of the original plain text block. The same rule applies to all the
other bit positions shown in the figure.

As we have noted after IP is done, the resulting 64-bit permuted text block is divided into two half blocks.
Each half-block consists of 32 bits, and each of the 16 rounds, in turn, consists of the broad-level steps
outlined in the figure.
Fig:- IP chart
 Step 1: Key transformation

We have noted initial 64-bit key is transformed into a 56-bit key by discarding every 8 th bit of the
initial key. Thus, for each a 56-bit key is available. From this 56-bit key, a different 48-bit Sub Key is
generated during each round using a process called key transformation. For this, the 56-bit key is
divided into two halves, each of 28 bits. These halves are circularly shifted left by one or two positions,
depending on the round.

For example: if the round numbers 1, 2, 9, or 16 the shift is done by only one position for other
rounds, the circular shift is done by two positions. The number of key bits shifted per round is shown in
the figure.

After an appropriate shift, 48 of the 56 bits are selected. From the 48 we might obtain 64 or
56 bits based on requirement which helps us to recognize that this model is very versatile and can
handle any range of requirements needed or provided. For selecting 48 of the 56 bits the table is
shown in the figure given below. For instance, after the shift, bit number 14 moves to the first
position, bit number 17 moves to the second position, and so on. If we observe the table , we will
realize that it contains only 48-bit positions. Bit number 18 is discarded (we will not find it in the
table), like 7 others, to reduce a 56-bit key to a 48-bit key. Since the key transformation process
involves permutation as well as a selection of a 48-bit subset of the original 56-bit key it is called
Compression Permutation.

Because of this compression permutation technique, a different subset of key bits is used in
each round. That makes DES not easy to crack.

 Step 2: Expansion Permutation

Recall that after the initial permutation, we had two 32-bit plain text areas called Left Plain
Text(LPT) and Right Plain Text(RPT). During the expansion permutation, the RPT is expanded from 32
bits to 48 bits. Bits are permuted as well hence called expansion permutation. This happens as the 32-bit
RPT is divided into 8 blocks, with each block consisting of 4 bits. Then, each 4-bit block of the previous
step is then expanded to a corresponding 6-bit block, i.e., per 4-bit block, 2 more bits are added.

This process results in expansion as well as a permutation of the input bit while creating output. The key
transformation process compresses the 56-bit key to 48 bits. Then the expansion permutation process
expands the 32-bit RPT to 48-bits. Now the 48-bit key is XOR with 48-bit RPT and the resulting output is
given to the next step, which is the S-Box substitution.

Source Code
Advantages & Disadvantages
Advantages

 DES has been around a long time (since 1977), even no actual weaknesses have been discovered
and the most effective attack is still brute force.
 DES is an official United States Government standard. The Government is needed to re-certify,
DES every five years and ask it be restored if essential.
 DES is also an ANSI and ISO standard. Because DES was designed to run on 1977 hardware, it is
rapid in hardware and associatively quick in software.
 It supports functionality to save a file in an encrypted format which can only be accessed by
supporting the correct password.
 It can change the system to create the directories password protected.
 It can review a short history of DES and represent the basic structures.
 It can define the building block component of DES.

Disadvantages

 The 56 bit key size is the largest defect of DES and the chips to implement one million of DES
encrypt or decrypt operations a second are applicable (in 1993).
 Hardware implementations of DES are very quick.
 DES was not designed for application and therefore it runs relatively slowly.
 In a new technology, it is improving a several possibility to divide the encrypted code, therefore
AES is preferred than DES.

9. Skill Development:
 Understand the logic behind DES algorithm
 Understand the concept of encrypt and decrypt.
 Understand the concept of cryptography.

10.Reference:

1. www.javatpoint.com
2. www.geeksforgeeks.org
3. https://www.tutorialspoint.com/
4. https://www.simplilearn.com/

11. Conclusion:
In conclusion, the Data Encryption Standard (DES) is a block cipher with a 56-
bit key length that has played a significant role in data security. However, due to
vulnerabilities, its popularity has declined. DES operates through a series of rounds
involving key transformation, expansion permutation, and substitution, ultimately
producing ciphertext from plaintext. While DES has historical significance, it’s
crucial to consider more secure encryption alternatives for modern data protection
needs.

Ms. Sandhya Chavan


(Guide of
Project)

You might also like